General

  • Target

    XEno.exe

  • Size

    63KB

  • MD5

    46f78699ba52074982eb53d91e40da70

  • SHA1

    c9bbb8eddd4674c49372eeea65aedb4c4bffb323

  • SHA256

    87772bb1ac6937a4126d72cc41ca517b2b010bb2891d40e5c7dcce34ee7fad03

  • SHA512

    c55a7436bdc75c9572849ec057eac9f0b0b9e33525d6bd3b161b2cb6d9655e614784648e1040d0777bab0c330b3bfe9c014ff5cc9220e88ea9e19d11ab4ff770

  • SSDEEP

    1536:/hYBLTM3Ufc4c7VFUt6cKGbbEwiVuGFZVclN:/hYBLTM3UfcVVFUkbGbbE9FzY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

DcRatMutex_qwqdanchun

Attributes
  • c2_url_file

    https://Pastebin.com/raw/fevFJe98

  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XEno.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections